当前位置:网站首页>Harbor2.2 quick check of user role permissions
Harbor2.2 quick check of user role permissions
2022-07-24 07:26:00 【InfoQ】
System level roles :
- Harbor System administrator:“Harbor System administrator ” Have the most permissions . In addition to the above authorities ,“Harbor System administrator ” You can also list all the items 、 Set ordinary users as administrators 、 Delete users and set vulnerability scanning policies for all images . Public projects “ library ” It's also owned by the administrator .
- anonymous ( Non system administrator ): When the user is not logged in , This user is considered “ anonymous ” user . Anonymous users do not have access to private items , And have read-only access to public projects .
Project user role


- Restricted visitors: Restricted visitors do not have full access to the item . They can pull images but not push , And they don't see logs or other members of the project . for example , You can create restricted visitors for users with shared project access from different organizations .
- visitor: The guest has read-only access to the specified item . They can pull and relabel images , But you can't push .
- developer: The developer has access to the project .
- Maintainer: Defenders have the power to transcend “ developer ” Authority , Including scanning images 、 View copy jobs and delete mirrors and helm charts The ability of .
- Project manager: When creating a new project , You will be assigned to the project “ProjectAdmin” role .“ProjectAdmin” In addition to read and write permissions , There are also some administrative permissions , Such as adding and deleting members 、 Start vulnerability scanning .
Full details of different role permissions
Project member permissions




Reference link :
边栏推荐
猜你喜欢

Laplace distribution

服务漏洞&FTP&RDP&SSH&rsync

【时序逻辑电路】——寄存器

Flow control statement of avascript

Source code analysis of Nacos configuration center

Filter filter

JMeter notes 2 | JMeter principle and test plan elements

Using depth and normal textures in unity

QoS服务质量四QoS边界行为之流量监管

17. What is the situation of using ArrayList or LinkedList?
随机推荐
Customization or GM, what is the future development trend of SaaS in China?
[leetcode simple] 20. Valid brackets stack
nacos配置中心源码分析
numpy.inf
Development system selection route
From the perspective of CIA, common network attacks (blasting, PE, traffic attacks)
MySQL queries all parents of the current node
OpenCascade笔记:gp包
记账APP:小哈记账1——欢迎页的制作
MySQL语句
C language from introduction to soil -- super detailed summary of operators
Give a string ① please count the number of times each letter appears ② please print the pair with the most letters
File “manage.py“, line 14 ) from exc ^ SyntaxError: invalid syntax出错的原因及解决方法
cookie_ session
cookie_session
Basic syntax of MySQL DDL and DML and DQL
Part II - C language improvement_ 1. Overview of C language
cloud的版本升级
Jay Chou's live broadcast was watched by more than 6.54 million people, with a total interaction volume of 450million, helping Kwai break the record again
numpy.arange